ClickFunnels Investigates Breach After Hackers Leak Business Data

ClickFunnels is investigating a data breach after hackers leaked detailed business data, including emails, phone numbers, and company profiles.
A hacking group calling itself “Satanic” claims to have breached ClickFunnels, a popular US-based software platform used by marketers and entrepreneurs to build sales funnels. The group is known for using BreachForums to announce its breaches but since the forum is down; it made the announcement via Telegram, claiming that data from the company was stolen on April 29, 2025.
In their post, the hackers alleged that they accessed ClickFunnels through a third party and published details of what they say was taken. According to the message, the breach includes:
- Adyen-related data: 90,000 unique phone numbers and 69,000 unique email addresses.
- ClickFunnels data: Two large data tables, one with 514,000 entries and another with 460,000.
For your information, Adyen is a global financial technology company based in the Netherlands that provides payment processing services for businesses. Despite the hacker group “Satanic” mentioning “Adyen” in their breach claims, there is no indication that Adyen itself was compromised (Unless hackers can prove otherwise).
The group referenced 90,000 unique phone numbers and 69,000 unique email addresses under the “Adyen” label, but this likely refers to data processed via ClickFunnels’ integration with Adyen, not a direct breach of Adyen’s systems.
However, earlier in April 2025, Adyen did suffer a DDoS attack that temporarily disrupted services in parts of Europe, but the company confirmed that no customer data was exposed during that incident. As of now, Adyen has not reported any breach, and the claims made by the hacker group remain unverified.
Hackread.com contacted ClickFunnels about the claims. The company was unaware of any such breach prior to being informed by Hackread. In response, a ClickFunnels spokesperson said: “We have not observed any suspicious activity or evidence indicating a data breach involving ClickFunnels systems.”
The company requested Hackread.com to share the data to allow for internal review. Hackread complied, and the investigation is now ongoing.
The data linked to the alleged ClickFunnels breach appears to be structured and highly detailed, suggesting it could be legitimate. Each entry includes fields such as company domain, estimated tech spend, sales revenue, employee roles, and multiple contact points, including phone numbers and emails.
The presence of metadata like Tranco and Page Rank scores, social media profiles, and timestamps such as “First Detected” and “Last Indexed” indicates that this is not randomly scraped data, but rather information likely pulled from a marketing analytics or CRM system.
The dataset also reflects business-level profiling typically used for lead generation or sales targeting, not just raw user records. Its level of organization and depth supports the possibility that it came from within a legitimate system tied to ClickFunnels or one of its integrated third-party services. However, only ClickFunnels can definitively confirm its authenticity.
While the hacker group specifically mentioned a breach “from a third-party,” they did not clarify whether this was a vendor, service provider, or integration point. That detail could matter greatly, as breaches through third-party services are often harder to detect and attribute.
At the time of writing, there is no public confirmation of a breach from ClickFunnels or Adyen. The hacker group’s claims remain unverified, though ClickFunnels is now reviewing the shared data.
If validated, this would mark a major breach given the size of the alleged dataset and the nature of the platform’s user base, which includes a large number of small business owners and online marketers.
ClickFunnels, founded in 2014, has grown rapidly without external funding and is used by thousands of companies to manage digital sales operations. The platform handles significant volumes of customer data through its landing pages, payment integrations, and email systems.
Hackread.com will continue to monitor the situation and update its reporting based on the outcome of ClickFunnels’ internal investigation. For now, users of ClickFunnels should remain alert for any unusual account activity and consider reviewing their account settings, especially if they use shared credentials across platforms.
HackRead